Windows 2000 Server
Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day, You use Disk Management and discover that the status of the third disk in the array is Missing. You want to recover the failed RAID-5 volume. What should you do first?

None of above
Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk
Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume
Replace the third disk and restart the server. Use disk Management to repair the volume
Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured.What should you do?

Block the group policy inheritance for the contoso.local domain
From the group policy options from the Michigan and Florida OU, set the option not override
None of above
From the group policy options from the contoso.local domains set the option not override
Block the group policy inheritance for Michigan and Florida OU

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You want to install Windows 2000 server on 15 new computers. You want to install, configure and test all 2000 servers before shipping them to your branch offices. You want the users at the branch offices to enter the serial numbers and computer names once they receive the computers. What should you do?

Create a UDF file by using setup manager. Create an Unattend.txt file that identifies the names of the new computers
Install Windows 2000 server on the computers. Use Setup Manager to create a sysprep.inf file for use with sysprep.exe Place the sysprep.inf on the computers and run sysprep -noidgen
Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of the new computers
Install Windows 2000 server on the computers. Use Sysprep.exe to create the Unattend.txt file, place file on the root of the drive
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the network administrator for your company. Mike Nash is a member of the Administration group, and Nate Sun is a member of the Intern group. Both groups are in the same domain. On the intranet server, the Administration group is placed in the Security group, and the Intern group is placed in the Nonsecurity group. The Security group is then granted Full Control permission for the Sales virtual directory. Nate needs to update new sales information that is located on the Sales virtual directory. What should you do so that Nate can perform this task?

Remove Nate fmm the Intern group
Make Nate a member of the Security group
None of above
Enable Anonymous access for the intranet server
Enable Anonymous access for the Sales virtual directory

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

None of above
Use Computer Management to stop and restart the Server service
Use Task Manager to end any related child processes
Use Task Manager to end and automatically restart the Explorer.exe process
Use Computer Management to stop and restart the Workstation service

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?

None of above
Apply a less restrictive custom security template to DC1
Ensure the Windows 2000 domain is configured in the mixed mode
Apply a less restrictive custom policy to Windows NT domain controller
Ensure the Windows 2000 domain is configured to run in the native mode

ANSWER DOWNLOAD EXAMIANS APP